Webinar: The Importance of Endpoint Privilege Management – ARCON and KuppingerCole Analysts Ag.

After a very successful webinar on the role of IAM in Multi-cloud Environments, ARCON and KuppingerCole Analysts AG. came together again to co-host a webinar on yet another burning topic in information security: endpoint security. On July 28th, 2022, Paul Fisher, Senior Analyst, KuppingerCole Analysts AG, and Anil Bhandari, Thought Leader and Chief Mentor, ARCON, […]
Emerging Trends and Expectations in the Access Management Space

Doing by learning and learning by doing—it is not just an adage, but also a time-tested approach that leads to innovation, agility, and experimentation. That’s the work culture we at ARCON have espoused over the years. As a result, whatever we build or innovate, we continue to push the boundaries by embracing a doing by […]
Webinar-Paul Fisher and Anil Bhandari on Multi-Cloud Governance: Key Takeaways

ARCON and KuppingerCole once again co-hosted a webinar to discuss some of the most important issues in the Information Security space. On July 12th, 2022, Paul Fisher, Senior Analyst, KuppingerCole Analysts AG and Anil Bhandari, Thought Leader and Chief Mentor, ARCON turned their attention to the role of Identity and Access Management (IAM) in multi-cloud […]
2022 Gartner® Magic Quadrant™ for Privileged Access Management

ARCON is proud to announce that, for the second year in a row, Gartner has named us a Leader in the Magic Quadrant for Privileged Access Management. In the 2022 Gartner Magic Quadrant for Privileged Access Management report, released in July 2022, ARCON has been recognized for its ability to execute and completeness of vision. […]
Why is Cyber Insurance of Paramount Importance?

The Context Having risk preventive measures in place is better than reacting to cyber threats. The former approach enables organizations to build a robust IT infrastructure through a layered approach, building security shields at every level, such as network, devices, data, and users. Nevertheless, cyber criminals are too sophisticated today and possess an uncanny ability […]
Why is Privileged Access Management (PAM) Critical for Telecom Service Providers?

Overview Telecommunication service providers are one of the fastest growing industries worldwide. Every telecom service provider today offers 4G/5G wireless services, mobile commerce, and high-speed broadband, which have become almost necessities in the daily lives of netizens. At the same time, they are always trying to upgrade their services to ensure that the customers get […]
Privileged Threat Analytics: Leveraging ARCON | PAM’s advanced features

The Context A robust privileged session reporting engine is at the cornerstone of secure privileged access management frameworks. Organizations require reporting tools to ensure regulatory compliance, audit readiness, and regular IT security assessments in a privileged access environment. The demand for frequent and random analysis of privileged sessions is increasing day by day due to […]
Why is it critical to identify and discover Privileged Accounts?

The Context In a vast and distributed IT infrastructure, IT administrators always face a huge risk of numerous unknown privileged accounts that are shared among multiple users. It’s an enormous challenge for the IT security and IT risk management team to identify the ownership of the privileged accounts if created in a group or on […]
Five reasons why Privilege Elevation on-demand is important

The Context Data breach incidents in 2022 have reached an all-time high with 43% of total data breach incidents happening due to malicious insiders, as per World Economic Forum. But why? Here’s an explanation. In the age of digitalization, every organization requires a set of users who are authorized to perform a specific set of […]
Cloud Governance & Compliance Guidelines

Overview Post-pandemic, businesses are looking for IT agility and increased mobility with many organizations opting for a cloud-first approach. Indeed, what we are witnessing now is the increased pace of cloud adoption. More and more organizations are adopting multiple public clouds, agile development platforms, and containerization technologies to boost overall IT efficiency. Nevertheless, whatever be […]